Features:
MapleStory.exe (v.186.3):
Multiclient (by closing the mutex)
MapleStory CRC bypass
Debug register check (you can debug mapestory using veh debugger)
Logo skipper (skip the video and logo bull shit when you load maplestory)
BlackCall.aes NtReadVirtualMemory block(a .dll loaded in MapleStory.exe)
NexonGuardSecurity(BlackCipher.aes) v.3.3.10.1:
NtOpenProcess block
NtQuerySystemInformation block
NtQueryVirtualMemory block
NtReadVirtualMemory block
NtOpenProcess & NtQuerySystemInformation are used by NGS to log your processes list(If you were to run for example cheat engine without a bypass you would get ngs error 0xd0500101 and if you try to relog you would get a permanent ban on your account). NtQueryVirtualMemory to retrieve injected .dll name (and other suspicious stuff that could lead a perma ban) and other information from Maplestory.exe & NGS. The NtReadVirtualMemory is for detecting memory edit.
Currently support window 10 64 bit, you can easily make it work for other 64 bit system using this table: http://j00ru.vexillium.org/ntapi_64/
Source code: https://hostr.co/BDZSkpzEBPCZ
Have someone else compile & upload with virus scan
MapleStory.exe (v.186.3):
Multiclient (by closing the mutex)
MapleStory CRC bypass
Debug register check (you can debug mapestory using veh debugger)
Logo skipper (skip the video and logo bull shit when you load maplestory)
BlackCall.aes NtReadVirtualMemory block(a .dll loaded in MapleStory.exe)
NexonGuardSecurity(BlackCipher.aes) v.3.3.10.1:
NtOpenProcess block
NtQuerySystemInformation block
NtQueryVirtualMemory block
NtReadVirtualMemory block
NtOpenProcess & NtQuerySystemInformation are used by NGS to log your processes list(If you were to run for example cheat engine without a bypass you would get ngs error 0xd0500101 and if you try to relog you would get a permanent ban on your account). NtQueryVirtualMemory to retrieve injected .dll name (and other suspicious stuff that could lead a perma ban) and other information from Maplestory.exe & NGS. The NtReadVirtualMemory is for detecting memory edit.
Currently support window 10 64 bit, you can easily make it work for other 64 bit system using this table: http://j00ru.vexillium.org/ntapi_64/
Source code: https://hostr.co/BDZSkpzEBPCZ
Have someone else compile & upload with virus scan
Comment